102 research outputs found

    AN EMPIRICAL TEST FOR THE EXPANSION-CONTROL MODEL FOR MANAGING END-USER COMPUTING

    Get PDF
    The purpose of this research is to determine if the expansion-control model as proposed, adapted, and refined (Munro and Huff 1985; Munro, Huff and Moore 1987) is useful for understanding and predicting changes in EUC management strategy over time. The long-term interest is not so much in understanding the specific problem of managing end-user computing as in understanding the general problem of managing new information technology in organizations. A field study was conducted with eighteen large firms in manufacturing and services to review their experience with EUC management over a nine year period. As predicted, most firms took a hands-off approach to EUC management during the initiation phase and evolved toward a balance between control and slack by 1987. However, changes in firms\u27 EUC management strategy over time were more complex than predicted. In addition, the expansion and control constructs were not as independent as previously thought. The interaction between the two variables appears to be related, at least in part, to time and the stage of diffusion. The research suggests that current models of EUC management (and thus organizational learning about information technology) may be too simplistic. Suggestions for developing more general models of the process are offered

    End User Computing and Information Security: a Retrospective Look at the De-centralisation of Data Processing and Emerging Organisational Information Risk

    Get PDF
    Information security assured on centralised systems through application of principles previously established for paper-based systems. The advent of personal computing and distributed computing potentially turned that model upside down. It seems that the eagerness of organisations for encouraging technology (Availability part of the CIA acronym) seemed to take precedence over the finer meaning of Confidentiality and Integrity, in spite of (in the UK, at least) changes to legislation. The huge increase in portable data storage capacities ensured that what may have been perceived as a minor irritant in the 1980s became a potential nightmare scenario by 2007, which caused two government reports to report “systemic failure”. This paper looks at the development of end-user computing, and suggests that the problem occurred because of a lack of information risk assessment over many year

    End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk

    Get PDF
    Information security assured on centralised systems through application of principles previously established for paper-based systems. The advent of personal computing and distributed computing potentially turned that model upside down. It seems that the eagerness of organisations for encouraging technology (Availability part of the CIA acronym) seemed to take precedence over the finer meaning of Confidentiality and Integrity, in spite of (in the UK, at least) changes to legislation. The huge increase in portable data storage capacities ensured that what may have been perceived as a minor irritant in the 1980s became a potential nightmare scenario by 2007, which caused two government reports to report “systemic failure”. This paper looks at the development of end-user computing, and suggests that the problem occurred because of a lack of information risk assessment over many year

    Champagne training on a beer budget

    Get PDF
    [Abstract]: When confronted by rapidly escalating costs for End User Computing (EUC) training and support, the Gold Coast City Council (GCCC) - the local government authority for Australia’s premier tourist destination - took a proactive stance by adopting a low-cost strategy. This strategy has now been in place for about six years and, as shown in this case study, is reaping rewards in terms of productivity increases and technology diffusion. After identifying an appropriate theoretical perspective for the study, this paper describes the EUC training approach taken at GCCC, and investigates its impact on the productivity of the 1500 person workforce. Both the trainees and the trainers were surveyed to evaluate fully this low-cost strategy. Related social issues of empowering the stakeholders are examined and recommendations are made to ensure that this approach will continue to provide champagne training on a beer budget

    Can Computers Motivate? The Association Between End User Computing Levels, Job Motivation, And Job Core Characteristics: A Field Study

    Get PDF
    While end user computing (EUC) has been studied from the standpoint of classification and management, less attention has been placed on how the utilization of the technology impacts on users jobs.  This study proposes that differing levels of EUC activity will be associated with differing levels of job characteristics and computer related job outcomes.  The study focused on the jobs of 121 middle managers and professional workers enrolled in an MBA program at a southeastern university.  The study finds that with successive levels of complexity in EUC utilization, there are corresponding increases in the levels of users' experiencing of job core characteristics

    Key Issues in Information Systems Management: A China\u27s Perspective

    Get PDF

    Investigating the Link Between Multinational Strategy-Structure and Management of End User Computing

    Get PDF
    The goal of this paper is to investigate the link between existing organization strategy-structure and the management of end user computing, in a multinational setting. This paper attempts to answer the question: Is there any consistency between the multinational strategy-structure and its end user computing strategy? The factors influencing the degree of fit between the organization strategy and end-user strategy will also be identified. Recommendations based on the preliminary investigation are made for tackling some of the problem areas. This preliminary investigation is followed by a detailed survey of multinational corporations. Though the results from the survey are not currently available, the initial results from the case studies in this research are presented and discussed

    Key issues in information system management: The DoD perspective

    Get PDF
    The article of record as published may be found at https://doi.org/10.1080/0743017930840558

    Pragmatic data modelling and design for end users

    Get PDF
    Many people are dependent on desktop end user tools such as spreadsheets and databases to manage their data. While they may have the technical skills to set up data repositories, many end users lack the analysis skills to design data models which reflect their often deceptively complex requirements. We advocate that a comprehensive data model should always be developed, with expert help, so that the end user can feel confident the subtleties of the data are fully understood. We then suggest that some pragmatic decisions can be made to simplify the model so that the end user can retain control over setting up and maintaining the application
    corecore